Sign up for our newsletter
Technology / Cybersecurity

Gartner’s Top 10 security trends for 2014

Gartner has announced its top ten security technologies for the rest of this year, emphasising the need for better protection around big data, cloud networks and the internet of things.

Speaking at the analyst firm’s security conference in Maryland, US, Neil MacDonald vice president and Gartner Fellow, stressed that companies keep up to date with the latest technology in order to ensure they remain as secure as possible.

He said: "Advanced targeted attacks and security vulnerabilities in software only add to the headaches brought by the disruptiveness of the Nexus of Forces, which brings mobile, cloud, social and big data together to deliver new business opportunities."

White papers from our partners

He added that organisations are increasing security resources, but that attacks were become more sophisticated over time.

Building on this Gartner outlined the following ten security technologies:

Software is set to increasingly lead digital security as time goes on, taking away the emphasis from hardware within data centres.

– In line with this operational technology, used to manage manufacturing and utility assets, is set to become more software based, in what Gartner sees as the industrial subset of the Internet of Things.

Big data security analytics will be an increasing trend over the next few years, with 40% of organisations predicted to have security data warehouses by 2020.

Pervasive sandboxing will increasingly allow software to be run in isolation on a virtual machine to determine whether it is dangerous to the main system.

Cloud access security brokers existing between consumers and providers will enable IT managers to have greater visibility and control of the service.

Adaptive access controls will provide a more dynamic way of allowing trusted individuals access to company assets based on the context of their device and location, among other things.

– As certificates lose their currency in the security world containment will also become a foundational strategy for security.

Endpoint detection and response will see central databases monitoring activity on company devices, with the data being analysed to improve the security of the system as a whole.

Machine-readable threat intelligence, including services analysing the reputation of users, will enable firms to combine intelligence feeds more fluently.

Interactive application security testing will combine elements from static and dynamic testing, allowing users to assess to what extent a bug can be exploited, and where it originates from.
This article is from the CBROnline archive: some formatting and images may not be present.